Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!

Greg White <g.white@CableLabs.com> Thu, 19 September 2019 19:02 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0ACA1202A0 for <tsvwg@ietfa.amsl.com>; Thu, 19 Sep 2019 12:02:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OgK0D9IDDpqS for <tsvwg@ietfa.amsl.com>; Thu, 19 Sep 2019 12:01:58 -0700 (PDT)
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (mail-eopbgr700118.outbound.protection.outlook.com [40.107.70.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D096912022A for <tsvwg@ietf.org>; Thu, 19 Sep 2019 12:01:57 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S6vAqqnoY5/fT74eLx7OL8Wo63Oq9CjyAiVa1HopBLKM0J+ML54vGOcG/dJNzcYD2bJyU9bwWRwWrHyqtjb80Kr6cNmgwJ0DZKkQ/kHyKFlU5XtIeDpRM4fCBohMxg++cLElV7naerib/Ckh9Xj4gOeaMi5EH/kFQluolBNY6Akmj1hJ2Z+wX2g9g3/jclhWDOgSaizyroy1ryQP8btKG9vBBm4Pe4lrwKswgdqybNKoEEb5fTojWHmG1QFtmwhU+6YiAi6egL4wsi4VBB+b5klu7+W+LS3BJwCPainFvBKQIgPit8MPQ6XAcPCNYMHeAF1iEWdUaoblE3JR3r/FbQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UWvi19jPxo5LISozML+N5CdkZ6gcvXNXANQVpfNNHOM=; b=VNhqIM3g6m7hRVBfV1fIeGtL9f0fRR5WoFtjfM8eAysL2y6qTuF/TLYou8wwD8K287Rfkg3Lh5EEgUbNFebXqr/K9SGlZsmWjNab/UJ9uE+AzsrNf3TCVOMXBkC1AAL6AznTMIxFBOQ2rhe1SMQOLOzFvauQ5K3Osz7sba/nHN7L0O3TqYRvcWeJJvd9pcj5PWOZjIgLcFZG+UQHRX+raPoeZ5liRSkIUonhdjbOp2mczoJQ94YwyfzsIOp80nOx4Aj3VxMjxf2HkBWBLUn2CZnp5UjCrve0z59u81J2VY7Ia24Xv5D5mJHxhYmnb8nTZEV25vjKg4zomLD4/OofCg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UWvi19jPxo5LISozML+N5CdkZ6gcvXNXANQVpfNNHOM=; b=DyMfSXKsnYuAxSujxOhQEeV+LO5Ivwo9QGmhc+Gc1CTUkuFu6J1ScWUEUhPHu+GQTQYOz/NzpVAJUqOfNwXNIxUqnHNd3xwmplxEeT+6zMJ/Msav0CUZgnFFl+M5CwhsL9hceTmB2flMXx7fjZ+X88yN5rAyuhmEISv1GDTwneE=
Received: from SN6PR06MB4655.namprd06.prod.outlook.com (52.135.117.85) by SN6PR06MB4974.namprd06.prod.outlook.com (52.135.110.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2284.19; Thu, 19 Sep 2019 19:01:55 +0000
Received: from SN6PR06MB4655.namprd06.prod.outlook.com ([fe80::cc2f:14c9:624d:4e74]) by SN6PR06MB4655.namprd06.prod.outlook.com ([fe80::cc2f:14c9:624d:4e74%6]) with mapi id 15.20.2263.023; Thu, 19 Sep 2019 19:01:55 +0000
From: Greg White <g.white@CableLabs.com>
To: "Black, David" <David.Black@dell.com>, Sebastian Moeller <moeller0@gmx.de>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
Thread-Index: AdVfSTsXh/eMA9Y2RLeop2cZ3ij2ZAD+TSWAAB2l37AAOvCoAACNW7egAD5LIIAADnNdgP//vlsAgAFTpoCAAMLCgIAAloOAgACa6oCAAP7TAIAD/HeAgAW48gA=
Date: Thu, 19 Sep 2019 19:01:55 +0000
Message-ID: <90F1F936-1D02-4F62-8B33-3DF01C38CA45@cablelabs.com>
References: <CE03DB3D7B45C245BCA0D24327794936306BBE54@MX307CL04.corp.emc.com> <AA4DBFC5-8D8F-4F43-80E4-BB9BA7F53486@cablelabs.com> <LEJPR01MB1178B6C102455F1F9886D49A9CBB0@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE> <F351D86E-DCE4-45CD-9B08-2E0C11090BF1@cablelabs.com> <LEJPR01MB11789EE6D8B7C732393BD1439CB70@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE> <B11AB47E-7E35-4599-A85B-DB0EF883E2B2@cablelabs.com> <BDF260C9-881C-4ACC-AF92-8E99C1CB07E0@gmx.de> <4B5C14EE-B3CF-455B-86C9-67D6E9BAEF4C@cablelabs.com> <40417573-1036-4238-A451-BFA6D8310B20@gmx.de> <E437444E-B896-4BD8-BC3B-01A535A6858D@cablelabs.com> <E35C0C36-9C33-40EF-B7F4-1D3FB508E4CB@gmx.de> <C3FEFBF9-C090-4232-981F-2DD02F116D31@cablelabs.com> <F0C44520-543D-47B8-93C2-966772BF3258@gmx.de> <CE03DB3D7B45C245BCA0D24327794936306F8AA5@MX307CL04.corp.emc.com>
In-Reply-To: <CE03DB3D7B45C245BCA0D24327794936306F8AA5@MX307CL04.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2019-09-15T21:38:39.5784326Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual; aiplabel=External Public
user-agent: Microsoft-MacOutlook/10.1c.0.190812
authentication-results: spf=none (sender IP is ) smtp.mailfrom=g.white@CableLabs.com;
x-originating-ip: [192.160.73.16]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0a0dc706-e3df-47fc-7af5-08d73d33d6d9
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600167)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:SN6PR06MB4974;
x-ms-traffictypediagnostic: SN6PR06MB4974:
x-microsoft-antispam-prvs: <SN6PR06MB497419D9B1B7A6D43AE7910EEE890@SN6PR06MB4974.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 016572D96D
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(39850400004)(136003)(396003)(366004)(51914003)(13464003)(189003)(199004)(6116002)(66066001)(6506007)(53546011)(26005)(6436002)(6512007)(446003)(11346002)(316002)(229853002)(561944003)(256004)(14444005)(8936002)(33656002)(58126008)(7736002)(5660300002)(99286004)(102836004)(6486002)(305945005)(76176011)(186003)(30864003)(8676002)(2906002)(91956017)(76116006)(66446008)(64756008)(66556008)(66476007)(66946007)(478600001)(36756003)(66574012)(71190400001)(71200400001)(110136005)(14454004)(25786009)(486006)(6246003)(4326008)(3846002)(81156014)(81166006)(86362001)(2616005)(476003)(85282002); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR06MB4974; H:SN6PR06MB4655.namprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: CableLabs.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: hsyYwzpz9wrsap5gRcLE+q5K2Bth3z7PFfVeLzVT6fSYWcywVA7aXv4o7bnm1Z9YDj6ZjapwYct6y7skvyCNV8QDJgKPCP7QFKWzbE4Ta/wWgqcF4iGoYaonoqgB/UQBW+mqrYI+5f0mxk4QhRVNT8I8V/MpF46cvfmNSadE+HOKKPEcr6zoOl+7RHJR3NGz2kHQcvOJKho0MspP74zofvoDnR+Q892tQ2z4cODhnUruir5Wl8YuMxCRzi73TDyaRp6WHEFrOBIhVqDGqa1cC4tzrEqyx7hGQ/Fdzs4JjuUS6JxQyq0OpxJsY/IrIZ6K5p1cM5qEKtLdWNzqNtiuosAnQK0USyRT7j+ZlQuL0LEFJaHgX+GKikLypsWcADYFBUKMPPXiK1z2SKuqswU2UplmiK3EVk60fgNjNa/qOxM=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <9059826AC910D4438BC49713E1C6D2B9@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0a0dc706-e3df-47fc-7af5-08d73d33d6d9
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Sep 2019 19:01:55.0729 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aPGZfMsB7YD/SYlOxApn1KOztsDPpHiEYVNuKLGXDBbvNDFQ0Ks5R8MS0oVeQRA3fdhLGubRHLJ5669q1SiieA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR06MB4974
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/CmTyQbfEGpd3Bmwr_HvmnllQH3A>
Subject: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Sep 2019 19:02:05 -0000

Thanks for the clarification.  We can certainly provide some more discussion on NQB in the context of existing WiFi equipment and networks (both RFC8325-compliant and non-compliant), as well a takeaway for me from the discussion is that we would be well served by making further recommendations around possibilities to better align WiFi equipment with the intent of the NQB PHB (e.g. segregation without prioritization & traffic protection).

I'll make a first attempt at this for the WG draft 00.

-Greg



On 9/15/19, 3:40 PM, "Black, David" <David.Black@dell.com> wrote:

    Resurfacing to top-post and answer Greg's original question:
    
    > On your item 3, could you clarify what you mean?   RFC 8325 does not discuss a “non queue building” service class, and so I don’t see a technical inconsistency between the NQB draft and RFC8325.
    >>  3)	RFC 8325 reflects the IETF consensus on how to map between Diffserv and WiFi QoS, hence the 8.3 section of the NQB draft needs to be modified to be consistent with RFC 8325.
    
    The posted version of the NQB draft cites RFC 8325 and then proceeds to ignore it in that Section 8.3 of the NQB draft discusses only what to do with implementations that don't support RFC 8325 (not a good approach).  At a minimum, that needs to be complemented by a discussion of what to do with implementations that do support RFC 8325, and perhaps some discussion of how to cope with the inevitable mix of support/non-support that will occur in practice.  The email discussion that has transpired to date appears to be "digging in a useful place" on how to handle NQB traffic on 802.11 networks, in particular when RFC 8325 is implemented.
    
    Thanks, --David
    
    > -----Original Message-----
    > From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Sebastian Moeller
    > Sent: Friday, September 13, 2019 4:46 AM
    > To: Greg White
    > Cc: tsvwg@ietf.org
    > Subject: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
    > 
    > 
    > [EXTERNAL EMAIL]
    > 
    > Hi Greg,
    > 
    > 
    > 
    > > On Sep 13, 2019, at 01:34, Greg White <g.white@cablelabs.com> wrote:
    > >
    > > Sebastian,
    > >
    > > Since it seems we’re going in circles (or maybe it's a very slowly converging
    > spiral), why don't I make the edits that I think you want to see, and then we
    > can go from there.
    > 
    > 	[SM] I am all for that approach, and I want to repeat that I realize that
    > I am not the arbiter in this matter and convincing me (while nice from my
    > perspective) is not important, convincing the chairs that my objections are
    > baseless or handled well seems more important.
    > 	Since I seem to be the main person in this discussion with the "how
    > does it look from the receiving end/end-user perspective" hat on, I will try to
    > stay maximally critical (but let me repeat that I like the idea in general,
    > modulo the side-effects I predict from a few of the detail-choices in the
    > draft) that might be annoying on an inter-personal social level, but hopefully
    > leads to a better technical soution.
    > 
    > 
    > >
    > > Based on your arguments, I've agreed to add some detail in a section on
    > "Applicability" that indicates more concretely that the intent of the NQB
    > marking is not for capacity-seeking traffic.  That text will supplement the
    > existing language in section 3 of the draft that currently reads:
    > >
    > >  There are many applications that send traffic at relatively low data
    > >   rates and/or in a fairly smooth and consistent manner such that they
    > >   are highly unlikely to exceed the available capacity of the network
    > >   path between source and sink.  These applications do not make use of
    > >   network buffers, but nonetheless can be subjected to packet delay and
    > >   delay variation as a result of sharing a network buffer with those
    > >   that do make use of them.  Many of these applications are negatively
    > >   affected by excessive packet delay and delay variation.  Such
    > >   applications are ideal candidates to be queued separately from the
    > >   capacity-seeking applications that are the cause of queue buildup,
    > >   latency and loss.
    > >
    > >   These Non-queue-building (NQB) flows are typically UDP flows that
    > >   send traffic at a lower data rate and don't seek the capacity of the
    > >   link (examples: online games, voice chat, DNS lookups).  Here the
    > >   data rate is essentially limited by the Application itself.  In
    > >   contrast, Queue-building (QB) flows include traffic which uses the
    > >   Traditional TCP or QUIC, with BBR or other TCP congestion
    > >   controllers.
    > >
    > > If you can point out specifically what in that text led you to believe it was
    > intended for capacity-seeking traffic, I would appreciate it.
    > 
    > 	[SM] Given how much language lawyering is applicable on when
    > parsing RFCs I would like to see more precision for the following terms:
    > 
    > "relatively low data rates" as an application developer how do I decide what
    > is relatively low? Or put differently relative to what exactly. Also If I have a
    > paced-UDP based video delivery application that does application level
    > switches between different bitrates based on experienced
    > buffering/capacity/delay (like a paced DASH equivalent over UDP, or given
    > that the sending rate for each segment is essentially fixed even standard
    > paced-DASH) does this qualify for NQB or not? I believe the draft should
    > make it crystal clear what can and what can not be considered to be NQB
    > material.
    > 
    > "such that they are highly unlikely to exceed the available capacity of the
    > network path between source and sink" while I understand the thought
    > behind this, it is simply impossible for an application to know that, given that
    > "available capacity" is not fixed (also a sending application will have very little
    > information about the available path capacity when it starts). Maybe I am
    > being to pedantic here, but starting with a wrong premise irks me.
    > 
    > "(examples: online games, voice chat, DNS lookups)" this still has the DNS
    > lookups which collide with rfc8325, I understand why giving DNS lookups a
    > low latency treatment (as DNS latency this directly translates into browsing
    > latency, albeit only for uncached entries), but keeping DNS here has
    > consequences on the wifi section IMHO.
    > 
    > "Queue-building (QB) flows include traffic which uses the Traditional TCP"
    > why the qualifier? As far as I understand TCPPraque would also be classified
    > to the QB queue by virtue of being capacity seeking. In a sense Prague is
    > included in the "other TCP congestion controllers" set, but I would prefer a
    > less ambiguous wording like
    > 
    > "In contrast, Queue-building (QB) flows include all flows which seek to utilize
    > the full capacity of the link like all TCP flows, as well as many SCTP  and UDP
    > flows, like QUIC"
    > If you want you can add "all TCPs independent of the used congestion
    > controller".
    > If you disagree and believe TCPPrague should be allowed in the NQB queue,
    > then at say so explicitly (but as far as I understand you really want to exclude
    > all TCPs).
    > 
    > Or put differently I would like to see a description of the behavior precise
    > enough that I can easily deduce from a packet capture whether a given flow
    > meets the NQB requirements, in a sense an enumerated list of expected
    > behaviors and of behaviors that disqualify for NQB marking/treatment.
    > I believe that would be in agreement with the stated goal that "the NQB
    > designation and marking would be intended to convey verifiable traffic
    > behavior, not needs or wants"
    > 
    > 
    > 
    > 	Conceptually my next issue is that I think just trusting the end-points
    > to mark correctly is too optimistic and that any scheduler giving special
    > treatment according to NQB-ness must be required to ascertain that each
    > individual flow is behaving according to the NQB requirements and ideally re-
    > mark non-compliant flows CS0 to protect downstream devices (if NQB maps
    > to anything but AC_BE). This requirement mainly is driven by the side effects
    > NQB will have on wifi, so if the special wifi power of NQB goes away, this
    > issue gets less important to me (also there are wifi scenarios where queue
    > protection as proposed upstream will not be sufficient).
    > 
    > 
    > 	Final and strongest objection: incompatibility between current wifi
    > gear and NQB.
    > 
    > I hope we can all agree that :
    > 
    > a) Wifi is a shared system not only between up- and downstream between
    > stations and APS, but also due to the fact that the same frequency bands are
    > often shared between different wifi networks (either directly be using the
    > same center frequency band, or by overlap of the side-bands).
    > 
    > b) no currently deployed wifi gear (NICs and APs) supports special treatment
    > for NQB flows.
    > 
    > c) most deployed gear supports access classes and will in all likelihood use the
    > default DSCP to AC mapping you described in a different post. (as far as I can
    > tell WMM is mandatory for wifi >= 802.11n)
    > 
    > d) The AC priority system is essentially a (weak) precedence system (lower
    > ACs might sneak in a tx_op even with higher AC queues full, but that is gong
    > to be rare and can result in multi second delays for packets in the lower ACs,
    > as observed in my home network). So in traditional thinking using ACs
    > requires some sort of access control/rate limiting to avoid undesired
    > starvation issues.
    > 
    > e) For quite a number of end-users the wifi rate is what limits the internet
    > access and not the access link itself (at least for higher bandwidth internet
    > plans in crowded RF environments like apartment buildings)
    > 
    > f) NQB is not intended to reduce the "performance of QB flows" but rather
    > isolate well behaving sparse and/or paced fixed-rate traffic from the
    > transient queue building effects of non-paced non-rate-limited flows.
    > 
    > g) NQB is intended such that  "that malicious or badly configured nodes can't
    > abuse it."
    > 
    > h) NQB traffic is not rate limited or rate policed. Even if each individual flow is
    > self rate-limiting the aggregate clearly is not intended to be.
    > 
    > i) For QB flows, the QB queue provides better performance (considering
    > latency, loss and throughput) than the NQB queue
    > 
    > j) NQB-marking (hopefully) will one day survive end to end.
    > 
    > Now, from e) it follows that the ISPs upstream NQB aware AQM will not
    > trigger in quite a number of instances, so making sure that NQB does no
    > harm is up to the wifi gear. Due to h) it is clear that NQB traffic will be able to
    > saturate the wifi link. Together with c) and d) this means that the mapping of
    > NQB to AC by the default rules will define the precedence level of the
    > saturating traffic. Due to a) good wifi citizens try to be considerate in not
    > hogging a channel to themselves (and due to CSMA/CA users on the same
    > channel should stochastically share tx_ops "fairly" in each AC). Most wifi
    > traffic currently is using AC_BE, but due to j) and h) that might change in the
    > future.
    > 
    > I now argue that using anything but AC_BE for NQB will violate f) and g).
    > Essentially in this not unlikely scenario NQB will confer a super-power (lower
    > latency and higher bandwidth) without any checks and balances
    > (incompatible with g)).
    > To make it explicit, with ACs > BE in play, AC_BE will essentially only get the
    > left-over bandwidth, which runs counter to i) as now QB flows need to mark
    > themselves such that they also get scheduled into the same AC as NQB to get
    > a level playing field.
    > 
    > 
    > For me that obviously means that the choice of DSCP for NQB needs to take
    > care that the above scenario can not happen.
    > So I vote to follow Ruediger's proposal for a 000xx1 codepoint for the
    > intended PHB such that the status quo is not negatively affected. With the
    > added bonus that this now has a chance of actually surviving end to end
    > today.
    > NQB aware APs/NICs can then implement proper NQB handling with or
    > without selective priority boosting to different ACs while making sure no
    > other flows/APs are starved.
    > 
    > 
    > Since I have made this point several times, without convincing you, I would
    > be happy to hear your rationale why this scenario is unlikely enough to still
    > justify aiming for a DSCP that maps to a AC > BE?
    > Ideally that rationale would be more refined than just noting, that this kind of
    > abuse is possible already today, the aim should be to at least "do no harm",
    > not just "do not make it significantly worse".
    > 
    > 
    > Best Regards
    > 	Sebastian
    > 
    > 
    >